Strong data encryption

Rigorous security testing

Our security testing program includes threat-modeling, manual code review, automated scanning, and third-party assessments. Our bug bounty program is the cornerstone of security testing for each and every Atlassian product.

Breach detection and monitoring

We have a security monitoring team dedicated to detecting signs of a data breach. Our security practices are constantly evolving in order to address new types of security threats and further strengthen our detection capabilities.

常见问题

Atlassian Bug Bounty

We've partnered with Bugcrowd to add an additional layer of security to our products by rewarding unique vulnerability research. If you've found a vulnerability, disclose the issue to our security team through our bug bounty program.

Keep your server secure

Latest security news

7 non-negotiable security practices for any cloud product

Implementing security best practices for your cloud products might feel like you’re playing a game of chess against a chess grandmaster. You think you need to know the most complex strategies and plan ten moves in advance, but in reality, you’re playing against a 3rd-grade checkers player.

While sophisticated security attacks do happen, it’s more likely that someone will break into your system using a simple phishing attack or they will crack one easy password and then figure out that people in your organization are using the same passwords over and over.

Atlassian urges changes to Australia’s Assistance and Access Act

Atlassian, in partnership with advocacy group StartupAUS and other Australian technology companies, has formally submitted a set of recommended improvements to the Telecommunication and Other Legislation Amendment (Assistance and Access) Act 2018, a law that was hastily approved by the Australian government in December 2018.